key escrow
(kē es´krō) (n.) A data security measure in which a cryptographic key is entrusted to a third party (i.e., kept in escrow). Under normal circumstances, the key is not released to someone other than the sender or receiver without proper authorization. Key escrow systems can be considered a security risk at the user puts access to information into the hands of the escrow agent holding the cryptographic key; however, key escrow systems are used to ensure that there is a backup of the cryptographic key in case the parties with access to key lose the data through a disaster or malicious intent.
The Clipper chip brought the idea of key escrow into the public consciousness.
Read Also:
- Key Fob
A fob, or more commonly called a key fob, is a small security hardware device with built-in authentication used to control and secure access to network services and data. The key fob displays a randomly generated access code, which changes periodically, usually every 30 to 60 seconds. A user first authenticates themselves on the key […]
- key length
The number of binary digits, or bits, in an encryption algorithm��s key. Key length is sometimes used to measure the relative strength of the encryption algorithm (i.e., the longer the key length, the more difficult the key is to decode).
- Keyboard
A keyboard is the set of typewriter-like keys that enables you to enter data into a computer and other devices. Computer keyboards are similar to electric-typewriter keyboards but contain additional keys. The keys typically found on computer keyboards are often classified as follows: Alphanumeric keys: The letters and numbers on the keyboard. Punctuation keys: The […]
- keyboard wedge
A hardware device or software program that interfaces with a computer to translate data read by a device other than a keyboard, such as a magnetic strip or bar code reader or other such scanning device, into keyboard data. For example, data entered into a database via a bar code reader must first be translated […]
- Keylogger
A keylogger is a type of surveillance software (considered to be either software or spyware) that has the capability to record every keystroke you make to a log file, usually encrypted. A keylogger recorder can record instant messages, e-mail, and any information you type at any time using your keyboard. The log file created by […]